Video Screencast Help
new discussion 04 Mar 2015
Hello. i have a Question that i have made some policies approx 30 policies in Data loss prevention in UAT enviroment.now i want to import same polices in production environment.so is there any possibilty to import these policies or other wiase i would make again same polices in production environment.
new blog entry 04 Mar 2015
最近、iOS デバイスユーザーを騙して iCloud アカウントのログイン情報を入力させようとする複数のフィッシングサイトが作成されています。攻撃者は、iPad や iPhone の紛失または盗難に遭ったユーザーを標的としているようです。このフィッシング詐欺は、アンダーグラウンドフォーラムに出入りする iOS デバイス窃盗犯向けのサービスの一環として実行されている可能性があります。 ある例では、iPad の盗難被害者宛てに iPad が発見されたことを知らせる迷惑メッセージが届きました。このメッセージには、iPad の現在位置を確認するにはリンクをタップするよう記載されています。 図 1. iPad の盗難被害者に届いたメッセージ 偽のメッセージに記載された URL に「i-cloud」という言葉が含まれているので、リンク先が iCloud ...
updated discussion 04 Mar 2015
Just few days ago, when I manually update the symantec endpoint protection definition, the execution went well as it shows a message saying that the the update was successful. However, when I open the symantec endpoint protection software, it still shows the previous definition date, instead of the latest date. When I open the shareDif folder (under symantec), I saw that there are 3 definition ...
new discussion 04 Mar 2015
Hello. i have a Question that i have made some policies approx 30 policies in Data loss prevention in UAT enviroment.now i want to import same polices in production environment.so is there any possibilty to import these policies or other wiase i would make again same polices in production environment.
updated discussion 04 Mar 2015
Just few days ago, when I manually update the symantec endpoint protection definition, the execution went well as it shows a message saying that the the update was successful. However, when I open the symantec endpoint protection software, it still shows the previous definition date, instead of the latest date. When I open the shareDif folder (under symantec), I saw that there are 3 definition ...
article comment 04 Mar 2015
updated article 03 Mar 2015
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using SEPM Alerts and Reports to Combat a Malware Outbreak, demonstrated how to use reporting features of SEP 12.1's SONAR component to identify Suspicious ...
updated article 27 Feb 2015
In Symantec Critical System Protection, you can use command line arguments to assign executables to their own Custom Process Sets and to activate certain rules or exceptions.  This purpose of this document is to lay out the command line matching process, the syntax of the wildcards, and how to troubleshoot an apparent mismatch in the argument. The command line matching process is fairly ...
new blog entry 04 Mar 2015
最近、iOS デバイスユーザーを騙して iCloud アカウントのログイン情報を入力させようとする複数のフィッシングサイトが作成されています。攻撃者は、iPad や iPhone の紛失または盗難に遭ったユーザーを標的としているようです。このフィッシング詐欺は、アンダーグラウンドフォーラムに出入りする iOS デバイス窃盗犯向けのサービスの一環として実行されている可能性があります。 ある例では、iPad の盗難被害者宛てに iPad が発見されたことを知らせる迷惑メッセージが届きました。このメッセージには、iPad の現在位置を確認するにはリンクをタップするよう記載されています。 図 1. iPad の盗難被害者に届いたメッセージ 偽のメッセージに記載された URL に「i-cloud」という言葉が含まれているので、リンク先が iCloud ...
updated blog entry 04 Mar 2015
Os cibercriminosos  realizam phishing com credenciais do iCloud das vítimas de roubo de iphones e ipads Hackers criaram sites de phishing para enganar os usuários cujos dispositivos iOS foram perdidos ou roubados, para assim liberar suas credenciais do iCloud. Os cibercriminosos criaram recentemente vários sites de phishing a fim de enganar os proprietários de dispositivos iOS e fazê-los ...
updated blog entry 04 Mar 2015
Your Cyber Trident  If you could only do three things for better cyber resilience, what would they be? You are faced with many questions to answer and they are coming in fast!  - Are we sure we are safe from cyber threats?  - Do we know if someone is targeting us?  - Do our users know the right things to do to keep us safe and when to flag a potential incident? ...
updated blog entry 04 Mar 2015
A newly discovered vulnerability in the SSL and TLS cryptographic protocols could allow attackers to intercept and decrypt communications between affected clients and servers. Dubbed the “FREAK” vulnerability, it facilitates man-in-the-middle (MITM) attacks against secure connections where the server accepts RSA_EXPORT cipher suites and the client either offers an RSA_EXPORT suite or uses an ...
updated blog entry 03 Mar 2015
When I think of the cyber security realm, three characteristics come top of mind- Velocity, Volume and Variety. These three facets of the attack landscape make security a consistently moving target. It’s one of the only verticals where an active attack actor can change the state of an industry with a touch of keyboard. Over the last decade we have had a front row seat to witness the evolution ...
updated blog entry 03 Mar 2015
Su nivel de protección depende de la actualización de seguridad más reciente. Cada día, la división Symantec Security Technology and Response publica más de 1050 archivos de firmas. Estas definiciones le brindan protección contra el software malicioso masivo más reciente, mientras que Insight consulta y SONAR se encarga de detectar las amenazas de día cero que no están dentro del alcance de ...
updated blog entry 03 Mar 2015
A proteção é avaliada de acordo com a atualização de segurança mais recente. Todos os dias, a divisão Security Technology and Response da Symantec publica mais de 1.050 arquivos de assinatura. Essas definições protegem contra o malware em massa mais recente, enquanto a tecnologia Insight faz consultas e o SONAR trabalha para detectar ameaças de dia zero não detectadas pelo escopo das ...
updated blog entry 03 Mar 2015
Os Cavalos de Troia financeiros que interceptam e redirecionam transações de sessões de banking online sempre foram populares entre os cibercriminosos. Essas campanhas provavelmente continuarão prevalentes no futuro próximo, uma vez que ataques contra clientes de bancos ainda são bem sucedidos em muitos casos. O malware financeiro de hoje evoluiu de forma a contornar as medidas de segurança ...
updated download 08 Jan 2015
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode and set to write to the Packet log for detailed information. As of now, this policy will detect 37 different filetypes. I will update it as I add more. Feel free to use ...
download comment 05 Dec 2014
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 24 Feb 2015
Presented by: Matt Georgy, Senior Technical Director, Symantec Global Security Operations Al Cooley, Director, DeepSight Cyber Intelligence   Webcast Summary: The threat environment has become increasingly hostile to enterprises.  The volume of attacks has grown dramatically, along with the sophistication of attackers.  At the same time the potentially enormous consequences ...
new event 24 Feb 2015
Presented by: Richard Hall, Director, Product Management Webcast Summary: As of January 2014, with Java 7 update 51 (7u51) Oracle requires authors and vendors of Rich Internet Applications (RIA) to sign code with certificates issued from a trusted Certification Authority. This mandate was driven by the need to enhance authentication and authorization in light of escalating cybercrime.  ...
new event 24 Feb 2015
Join Novacoast and learn how to protect your data! - Organizations can measurably reduce their risk of data loss by understanding where their data is going, how it’s being used, and how to prevent its loss or theft.  We’d love to have you join us for this Data Protection webinar and further discuss the risk of data loss and how customers can prevent these dangers in the environment. As ...
updated event 19 Feb 2015
Please Note: This meeting has been rescheduled from February 26th to March 12th! Please join us for the next Chicago Security & Compliance User Group meeting on Thursday, February 26 from 12:00pm to 4:00pm at Acxiom. Lunch will be served! Agenda Lunch, Welcome & Introductions Roadmap of SEP (via WebEx) by Josh Etsten, Sr. Product Manager, Symantec Mansoor Raza, Symantec SE, will be at ...
updated video 19 Feb 2015
This is lesson 7 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelilgence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 5 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 4 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 3 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 10 Dec 2014
This is lesson 2 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 1 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 05 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons: Lesson 1: DeepSight Intelligence Portal Overview - Discuss the variety of intelligence the portal provides - Set up your account and familiarize yourself with the portal - Review the analyst journals - Determine who to contact if you have a problem - ...
new idea 26 Feb 2015
Currently, SEP maanger sends ip address of msanager while sending report. For example: Report scheduled by: admin. Server name: sep01. IP address: 10.0.14.17,10.0.9.6. Report generated on: 13/02/2015 1:07:14 PM. Report type: Risk Report. Report description: Created automatically during product installation.. While working in environment where security policy prevents publishing IPS in ...
new idea 25 Feb 2015
Add a schedule and priority on which server is running the Sync. I would like to see a more detailed schedule to be able schedule the Synchonized Direcotry settings. Today you can add the servers and add the schedule. Then the sync is running comming days the time you configured this. I want to have my servers synchonized during night time, today I need to go up an configure this settings ...
new idea 24 Feb 2015
It would be nice if the SEPM console could remotely remove trouble SEP clients, clients where the definitions have become corrupt, or something has happened that will not allow re-insatllation of SEP.
new idea 24 Feb 2015
Additional Predfined Path Variables should be added to the custom exclusions.  My suggestions: PROGRAM_FILES_X86 = C:\Program Files (x86) or even better 1 variable that automatically includes both paths The COMMON_ set of variable need to include the C:\Users path for Win Vista+ operating systems USER_PROFILE = the path for the current logged in user's profile (C:\Users\username) There ...
new idea 24 Feb 2015
Allow people to customize dashboard. For example, we only use SMG for outbound filtering currently but the dashboard defaults to showing inbound stats.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Brɨan
1719
19
Mithun Sanghavi
1228
59
P_K_
1131
28
SMLatCST
376
1
jjesse
58
24

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.